Communication techniques for simple network management protocol
Simple network management protocol or SNMP is encapsulated into HTTP traffic. The HTTP traffic is in a form that allows it to pass through a firewall. At one end, and SNMP request is encapsulated and sent to a remote computer. The remote computer de-encapsulates the request and responds to the SNMP request. The SNMP response is encapsulated as an HTTP response, and sent to the management station which interprets the results.
Latest Intel Patents:
- Systems and methods for module configurability
- Hybrid boards with embedded planes
- Edge computing local breakout
- Separate network slicing for security events propagation across layers on special packet data protocol context
- Quick user datagram protocol (UDP) internet connections (QUIC) packet offloading
Simple network management protocol or SNMP is described in various RFCs, including SNMP v1 described in re RFC1155, Internet Engineering Task Force (IETF), 1997 and other flavors of SNMP including v2 and v3. SNMP can be used to exchange data between computers that indicates about network activity. The data travels between a number of managed computers/nodes and a network management station. A number of different network devices such as sub agents, master agents, and the like may also be managed using the SNMP protocol. The details of SNMP communications are well known in the art. The communications may produce a file, such as a MIPS file, that includes a textual data describing the network. The system often uses a polled interface which sends information to every item on the network, and receives information back.
SNMP is used by existing computer programs such as HP OpenView™.
These and other aspects will now be described with reference to the accompanying drawings, in which:
The internet may be the publicly-available “Internet”, or a private gateway of any type, such as a dial-in gateway.
Parts of the network, such as computers 130 and 135, may be located on the Internet connection 115 and hence outside the firewall. However, a message that is in SNMP protocol may not be able to pass the firewall to monitor these computers. At the very least, a custom change of the firewall may be necessary. Moreover, in SNMP protocol version 3, a special socket called UDP is run which may make it difficult to set up the firewall for passage of SNMP protocol, even if this were desired.
This invention recognizes that virtually every firewall is configured to pass HTTP Internet traffic. Since the HTTP traffic can traverse the firewall, the present system defines encapsulating the SNMP Traffic into the HTTP Protocol.
A more detailed flow diagram is shown in
<SNMP>
OID=1.4.7.9.2.3
Value=“Running”
<\SNMP>
Note that this includes tags <SNMP>, <\SNMP>which look like HTTP tags. These tags can be defined in a specific version of the HTTP, or else most browsers will interpret them as unknown tags and simply ignore the text in between them. However, since the SNMP information will likely never be read by a browser, defining these may be unnecessary. In any case, this sequence is sent as though it were an HTTP response at 340. Again, this is put onto the Internet connection 115, and passes the firewall 120 to be sent to the management station 100. Management station 100 receives the HTTP sequence at 345, and removes the encapsulation at 350. Once the encapsulation is removed, the SNMP response is handled at 355 exactly like any normal SNMP response would be handled.
Significant advantages of this system can be expected. Since the SNMP program can operate as normal, this system may be totally transparent to the SNMP program. In another embodiment, however, it may be the SNMP program itself that does the HTTP encapsulation.
In another embodiment, shown in
This system can run in software on a computer as described herein, and also can run in hardware such as a field programmable gate array, digital signal processor or other hardware device.
In addition, while this system has been described for use with SNMP, this same technique can be used with other management schemes which have a message which will not pass a firewall. In any of these management schemes, the actual data can be encapsulated into HTTP and used to control the firewall.
Although only a few embodiments have been disclosed in detail above, other modifications are possible. All such modifications are intended to be encompassed within the following claims.
Claims
1. A method, comprising:
- obtaining, at a first node, information indicative of a network condition;
- encapsulating said information into an HTTP protocol; and
- sending said HTTP protocol to a network managing node.
2. A method as in claim 1, wherein said information is SNMP information.
3. A method as in claim 1, wherein said HTTP protocol is an HTTPs protocol.
4. A method as in claim 1, wherein said encapsulating comprises forming an HTTP message including said information therein.
5. A method as in claim 1, wherein said information is textual information, and wherein said encapsulating comprises forming an HTTP message including said textual information therein.
6. A method as in claim 5, wherein said HTTP message includes tags indicating SNMP information.
7. A system, comprising:
- a first, monitoring computer, to run a first program that monitors a network condition;
- a second, monitored computer, to run a second program which allows said first program to monitor the network condition;
- a connection between said first and second computers, said connection including a firewall which blocks at least a first kind of non-HTTP communications but does not block HTTP communications; and
- at least one of said first and second computers to run a third program that encapsulates network information indicative of the network condition into HTTP protocol.
8. A system as in claim 7 wherein said third program is part of one of said first and second programs.
9. A system as in claim 7 wherein said first and second programs each operate based on SNMP protocol.
10. A system as in claim 9, wherein said encapsulating comprises forming tags in the HTTP protocol which represent said SNMP protocol.
11. A system as in claim 7 wherein said HTTP protocol is HTTPs.
12. A method, comprising:
- forming an SNMP request for information from a remote computer, in a management station computer;
- changing said SNMP request to a form which will be passed by a firewall, wherein said changed SNMP request is encapsulated into HTTP protocol; and
- sending said changed SNMP request to said remote computer through said firewall.
13. A method as in claim 12, wherein said HTTP protocol includes a secure socket layer.
14. A method as in claim 12, wherein said changed SNMP request includes tags in a style usually used by said HTTP protocol.
15. A method as in claim 12 further comprising:
- receiving said changed SNMP request in said remote computer; and
- changing said changed SNMP request into a standard SNMP request.
16. A method as in claim 15, further comprising:
- in said remote computer, preparing an SNMP response;
- encapsulating said SNMP response as a changed SNMP response; and
- sending said changed SNMP response through said firewall to said management station computer.
17. A method as in claim 16 further comprising, at said management station computer, changing said changed SNMP response to a standard SNMP response.
6008805 | December 28, 1999 | Land et al. |
6073165 | June 6, 2000 | Narasimhan et al. |
6182157 | January 30, 2001 | Schlener et al. |
6385644 | May 7, 2002 | Devine et al. |
6412009 | June 25, 2002 | Erickson et al. |
6490620 | December 3, 2002 | Ditmer et al. |
6496859 | December 17, 2002 | Roy et al. |
6675193 | January 6, 2004 | Slavin et al. |
6681232 | January 20, 2004 | Sistanizadeh et al. |
6704768 | March 9, 2004 | Zombek et al. |
20010054064 | December 20, 2001 | Kannan |
- O'Guin, S. et al., “Application of virtual private networking technology to standards-based management protocols across heterogeneous firewall-protected networks”, Military Communications Conf. Proc., IEEE , Oct. 31-Nov. 3, 1999, vol. 2, pp. 1251-1255.
- 1 Security considerations for workflow systems□□Li, S.; Kittel, A.; Jia, D.; Zhuang, G.;□□Li, S., et al., “Security considerations for workflow systems”, Network Operations and Management Symposium 2000, 2000 IEEE/IFIP, Apr. 10-14, 2000, pp. 655-668□□.
- O'Guin, S., et al., “Application of Virtual Private Networking Technology to Standards-Based Management Protocols Across Heterogeneous Firewall-Protected Networks”, Military Communications Conf. Proc., IEEE, Oct. 31-Nov. 3, 1999, pp. 1251-1255.
Type: Grant
Filed: Nov 30, 2000
Date of Patent: Aug 15, 2006
Patent Publication Number: 20020065908
Assignee: Intel Corporation (Santa Clara, CA)
Inventors: Alex O. Agerholm (Glostrup), Kell Michael Jensen (Gentofte)
Primary Examiner: Frantz B. Jean
Attorney: Fish & Richardson P.C.
Application Number: 09/734,330
International Classification: G06F 15/173 (20060101);